Certified Data Privacy Solutions Engineer (CDPSE)
Training at a glance
Level
Advanced
Duration
5 Days
Experience
5 years: IT & Security
Average Salary
$163,000
Labs
No
Level
Advanced
Duration
4 Days
Experience
5 years: IT & Security
Average Salary
$145,240
Labs
No
Training Details
Upon successful completion of this course, students will be able to:
- Analyze and integrate security and privacy requirements to protect data across enterprise systems and applications
- Articulate the relationship between technology implementation and legal/regulatory mandates, ensuring technical controls satisfy compliance obligations
- Design and enforce data privacy controls across the entire data lifecycle (collection, processing, storage, use, and disposal)
- Establish, maintain, and manage a comprehensive privacy governance framework that defines policies, roles, and accountability within an organization
- Design and implement privacy-enhanced solutions and privacy architectures that embed privacy controls by default (Privacy-by-Design)
- Evaluate and implement industry-leading privacy best practices and standards to mitigate risk and demonstrate compliance
- Select, configure, and manage technical privacy solutions (e.g., anonymization, pseudonymization, encryption) to meet specific data protection goals
- Module 1: Privacy Governance
- Privacy Governance
- Personal Information
- Privacy Principles (e.g., Privacy by Design, Consent, Transparency)
- Privacy Laws and Regulations
- Privacy Documentation (e.g., Policies, Guidelines)
- Privacy Operations
- Organizational Culture, Structure, and Responsibilities
- Vendor and Supply Chain Management
- Incident Management
- Data Subject Rights, Requests, and Notification
- Privacy Governance
- Module 2: Privacy Risk Management and Compliance
- Risk Management
- Risk Management Process and Policies
- Privacy-Focused Assessment (e.g., Privacy Impact Assessment (PIA))
- Privacy Training and Awareness
- Threats and Vulnerabilities
- Risk Response
- Compliance
- Privacy Frameworks
- Evidence and Artifacts
- Program Monitoring and Metrics
- Risk Management
- Module 3: Data Lifecycle (Implied Domain Title)
- Data Collection and Processing
- Data Inventory, Dataflow Diagram, and Classification
- Data Quality (e.g., Accuracy)
- Data Use Limitation
- Data Analytics (e.g., Aggregation, AI, Data Warehouse)
- Data Persistence and Destruction
- Data Minimization
- Data Disclosure and Transfer
- Data Storage, Retention, and Archiving
- Data Destruction
- Data Collection and Processing
- Module 4: Privacy Engineering
- Technology Stacks
- Infrastructure and Platform Technology (e.g., legacy, cloud computing)
- Devices and Endpoints
- Connectivity
- Secure Development Life Cycle
- APIs and Cloud-Native Services
- Privacy Related Security Controls
- Asset Management
- Identity and Access Management
- Patch Management and Hardening
- Communication and Transport Protocols
- Encryption and Hashing
- Monitoring and Logging
- Privacy Controls
- Consent Tagging
- Tracking Technologies (e.g., cookie management)
- Anonymization and Pseudonymization
- Privacy Enhancing Technologies (PETs)
- AI/Machine Learning (ML) Considerations
- Technology Stacks
Upcoming Classes
We Offer More Than Just ISACA Training
Our successful training results keep our corporate and military clients returning. That’s because we provide everything you need to succeed. This is true for all of our courses.
Strategic Planning & Project Management
From Lean Six Sigma to Project Management Institute Project Management Professional, Agile and SCRUM, we offer the best-in-class strategic planning and project management training available. Work closely with our seasoned multi-decade project managers.
IT & Cybersecurity
ATA is the leading OffSec and Hack the Box US training provider, and a CompTIA and EC-Council award-winning training partner. We offer the best offensive and defensive cyber training to keep your team ahead of the technology skills curve.
Leadership & Management
Let us teach your team the high-level traits and micro-level tools & strategies of effective 21st-century leadership. Empower your team to play to each others’ strengths, inspire others and build a culture that values communication, authenticity, and community.